skip to main content
10.1145/2462096.2462103acmconferencesArticle/Chapter ViewAbstractPublication PageswisecConference Proceedingsconference-collections
research-article

Counter-jamming using mixed mechanical and software interference cancellation

Published: 17 April 2013 Publication History

Abstract

Wireless networks are an integral part of today's cyber-physical infrastructure. Their resiliency to jamming is critical not only for military applications, but also for civilian and commercial applications. In this paper, we design, prototype, and evaluate a system for cancelling jammers that are significantly more powerful than the transmitting node. Our system combines a novel mechanical beam-forming design with a fast auto-configuration algorithm and a software radio digital interference cancellation algorithm. Our mechanical beam-forming uses a custom-designed two-elements architecture and an iterative algorithm for jammer signal identification and cancellation. We have built a fully functional prototype (using 3D printers, servos, USRP-SDR) and demonstrate a robust communication in the presence of jammers operating at five orders of magnitude stronger power than the transmitting node. Similar performance in traditional phased arrays and radar systems requires tens to hundreds of elements, high cost and size

References

[1]
B. Awerbuch, A. Richa, and C. Scheideler. A jamming-resistant mac protocol for single-hop wireless networks. In PODC, pages 45--54, 2008.
[2]
M. Bender, M. Farach-Colton, S. He, B. Kuszmaul, and C. Leiserson. Adversarial contention resolution for simple channels. In SPAA, pages 325--332, 2005.
[3]
E. Brookner. Phased arrays and radars - past, present and future. Microwave Journal, 49(1):24--46, 2006. ISSN 01926225.
[4]
E. Brookner. Phased-array radar: Past, astounding breakthroughs, and future trends. Microwave Journal, 51(1):30--50, 2008. ISSN 01926225.
[5]
A. Cassola, T. Jin, G. Noubir, and B. Thapa. Efficient spread spectrum communication without pre-shared secrets. IEEE Transactions on Mobile Computing, to appear.
[6]
A. Cassola, W. Robertson, E. Kirda, and G. Noubir. A practical, targeted, and stealthy attack against wpa enterprise authentication. In Proceedings of NDSS, 2013.
[7]
J. Chiang and Y.-C. Hu. Dynamic jamming mitigation for wireless broadcast networks. In INFOCOM, pages 1211--1219, 2008.
[8]
J. Choi, M. Jain, K. Srinivasan, P. Levis, and S. Katti. Achieving single channel, full duplex wireless communication. In MOBICOM, pages 1--12, 2010.
[9]
J. Dong, R. Curtmola, and C. Nita-Rotaru. Practical defenses against pollution attacks in intra-flow network coding for wireless mesh networks. In In Proceedings of WiSec, pages 111--122, 2009.
[10]
FCC. Jammer enforcement, 2012. http://www.fcc.gov/encyclopedia/jammer-enforcement, http://transition.fcc.gov/eb/News_Releases/DOC-304575A1.html.
[11]
S. Gilbert, R. Guerraoui, and C. Newport. Of malicious motes and suspicious sensors: On the efficiency of malicious interference in wireless networks. In OPODIS, 2006.
[12]
GNU. Gnu radio. http://www.gnuradio.org.
[13]
S. Gollakota, H. Hassanieh, B. Ransford, D. Katabi, and K. Fu. They can hear your heartbeats: Non-invasive security for implantable medical devices. In SIGCOMM, pages 2--13, 2011.
[14]
iClinks. Scada and industrial automation, ethernet scada and ethernet i/o. http://www.iclinks.com/.
[15]
M. Jain, J. Choi, T. Kim, D. Bharadia, S. Seth, K. Srinivasan, P. Levis, S. Katti, and P. Sinha. Practical, real-time, full duplex wireless. In Proceedings of international conference on Mobile computing and networking, pages 301--312, Las Vegas, USA, 2011.
[16]
T. Jin, G. Noubir, and B. Thapa. Zero pre-shared secret key establishment in the presence of jammers. In In Proceedings of ACM MobiHoc, pages 219--228, 2009.
[17]
C. Koo, V. Bhandari, J. Katz, and N. Vaidya. Reliable broadcast in radio networks: The bounded collision case. In PODC, pages 258--264, 2006.
[18]
J.-D. Kraus. Antennas. Mcgraw Hill Higher Education; 3rd edition, 2001.
[19]
A. Liu, P. Ning, H. Dai, Y. Liu, and C. Wang. Defending dsss-based broadcast communication against insider jammers via delayed seed-disclosure. In Proceedings of ACSAC'2010, 2010.
[20]
S. Liu, L. Lazos, and M. Krunz. Thwarting inside jamming attacks on wireless broadcast communications. In In Proceedings of ACM WiSec, pages 29--40, 2011.
[21]
Y. Liu, P. Ning, H. Dai, and A. Liu. Randomized differential dsss: jamming-resistant wireless broadcast communication. In INFOCOM, pages 695--703, 2010.
[22]
R. Mailloux. Phased Array Antenna Handbook. Artech Print on Demand, 2005.
[23]
R. Miller. FCC steps up crackdown on cell jammers, 2012. http://www.securitysystemsnews.com/article/fcc-steps-crackdown-cell-jammers.
[24]
NPR. Congress passes FAA bill that speeds switch to GPS, 2012. http://www.npr.org/.
[25]
K. Pelechrinis, S. V. Krishnamurthy, C. Gkantsidis, and I. Broustis. Ares: An anti-jamming reinforcement system for 802.11 networks. CoNEXT, pages 181--192, 2009.
[26]
PG & E. Smart meters by the numbers, 2011. http://www.pge.com/myhome/customerservice/smartmeter/deployment/.
[27]
J. G. Proakis and M. Salehi. Digital Communications. McGraw-Hill, 5 edition, 2007.
[28]
E. Research. Universal software radio peripheral. http://www.ettus.com/.
[29]
SEMAPHORE. Integrated scada, control, and communication solutions. http://www.cse-semaphore.com/, 2011.
[30]
M. K. Simon, J. K. Omura, R. A. Scholtz, and B. K. Levitt. Spread Spectrum Communications Handbook. McGraw-Hill, 2001.
[31]
D. Slater, P. Tague, R. Poovendran, and B. J. Matt. A coding-theoretic approach for efficient message verification over insecure channels. In Proceeding of ACM WiSec, 2009.
[32]
M. Strasser, C. Popper, and S. Capkun. Efficient uncoordinated FHSS anti-jamming communication. In Proceedings of ACM MobiHoc, 2009.
[33]
M. Strasser, C. Popper, S. Capkun, and M. Cagalj. Jamming-resistant key establishment using uncoordinated frequency hopping. In Proceedings of IEEE Symposium on Security and Privacy, 2008.
[34]
Synetcom. Synetcom industrial wireless systems. http://www.synetcom.com/.
[35]
H. V. Trees. Detection, Estimation, and Modulation Theory, Part I. Wiley & Sons, 2001.
[36]
D. Tse and P. Viswanath. Fundamentals of wireless communication. Cambridge University Press, New York, NY, USA, 2005.
[37]
uPrint. Uprint plus. http://www.uprint3dprinting.com/.
[38]
vMonitor. Scada wireless systems. http://www.vmonitor.com/, 201
[39]
M. Wilhelm, I. Martinovic, J. B. Schmitt, and V. Lenders. Short paper: reactive jamming in wireless networks: how realistic is the threat? In Proceedings of ACM WiSec, 2011.
[40]
W. Xu, K. Ma, W. Trappe, and Y. Zhang. Jamming sensor networks: attack and defense strategies. IEEE Network, 20(3):41--47, 2006.
[41]
W. Xu, W. Trappe, and Y. Zhang. Channel surfing: defending wireless sensor networks from interference. In Proceedings of IPSN, 2007.
[42]
W. Zhang, M. Kamgarpour, D. Sun, and C. Tomlin. A hierarchical flight planning framework for air traffic management. Proceedings of the IEEE, 100(1), 2012.

Cited By

View all
  • (2024)Multi-Antenna OFDM Jamming Mitigation for Unmanned Aerial Vehicle Swarm Communication2024 21st International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)10.1109/ICCWAMTIP64812.2024.10873729(1-6)Online publication date: 14-Dec-2024
  • (2024)Deep Learning for Robust and Secure Wireless CommunicationsNetwork Security Empowered by Artificial Intelligence10.1007/978-3-031-53510-9_6(149-176)Online publication date: 24-Feb-2024
  • (2023)JaX: Detecting and Cancelling High-power Jammers Using Convolutional Neural NetworkProceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks10.1145/3558482.3590178(293-304)Online publication date: 29-May-2023
  • Show More Cited By

Index Terms

  1. Counter-jamming using mixed mechanical and software interference cancellation

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      WiSec '13: Proceedings of the sixth ACM conference on Security and privacy in wireless and mobile networks
      April 2013
      230 pages
      ISBN:9781450319980
      DOI:10.1145/2462096
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      In-Cooperation

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 17 April 2013

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. anti-jamming
      2. beam forming
      3. software radio

      Qualifiers

      • Research-article

      Conference

      WISEC'13
      Sponsor:

      Acceptance Rates

      WiSec '13 Paper Acceptance Rate 26 of 70 submissions, 37%;
      Overall Acceptance Rate 98 of 338 submissions, 29%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)35
      • Downloads (Last 6 weeks)3
      Reflects downloads up to 03 Mar 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)Multi-Antenna OFDM Jamming Mitigation for Unmanned Aerial Vehicle Swarm Communication2024 21st International Computer Conference on Wavelet Active Media Technology and Information Processing (ICCWAMTIP)10.1109/ICCWAMTIP64812.2024.10873729(1-6)Online publication date: 14-Dec-2024
      • (2024)Deep Learning for Robust and Secure Wireless CommunicationsNetwork Security Empowered by Artificial Intelligence10.1007/978-3-031-53510-9_6(149-176)Online publication date: 24-Feb-2024
      • (2023)JaX: Detecting and Cancelling High-power Jammers Using Convolutional Neural NetworkProceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks10.1145/3558482.3590178(293-304)Online publication date: 29-May-2023
      • (2020)Countering cross-technology jamming attackProceedings of the 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks10.1145/3395351.3399367(99-110)Online publication date: 8-Jul-2020
      • (2020)Message Integrity Protection Over Wireless Channel: Countering Signal Cancellation via Channel RandomizationIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2017.275160017:1(106-120)Online publication date: 1-Jan-2020
      • (2019)Security of GPS/INS Based On-road Location Tracking Systems2019 IEEE Symposium on Security and Privacy (SP)10.1109/SP.2019.00068(587-601)Online publication date: May-2019
      • (2019)Cellular Based Small Unmanned Aircraft Systems MIMO Communications2019 Integrated Communications, Navigation and Surveillance Conference (ICNS)10.1109/ICNSURV.2019.8735229(1-6)Online publication date: Apr-2019
      • (2018)Demo abstract: An anti-jamming wireless communication systemIEEE INFOCOM 2018 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS)10.1109/INFCOMW.2018.8406825(1-2)Online publication date: Apr-2018
      • (2017)A data trust framework for VANETs enabling false data detection and secure vehicle tracking2017 IEEE Conference on Communications and Network Security (CNS)10.1109/CNS.2017.8228654(1-9)Online publication date: Oct-2017
      • (2017)CyberMoat: Camouflaging critical server infrastructures with large scale decoy farms2017 IEEE Conference on Communications and Network Security (CNS)10.1109/CNS.2017.8228642(1-9)Online publication date: Oct-2017
      • Show More Cited By

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media